1. Xuehu Y et al (2020) A common method of share authentication in image secret sharing. IEEE Trans Circ Syst Video Technol 31(7):2896–2908
2. Xuehu Y et al (2021) Robust secret image sharing resistant to noise in shares. ACM Trans Multimedia Comput Commun Appl (TOMM) 17(1):1–22
3. Xuehu Y et al (2023) Fake and dishonest participant immune secret image sharing. ACM Trans Multimedia Comput Commun Appl 19(4):1–26
4. Lizhi X et al (2023) RDH-DES: reversible data hiding over distributed encrypted-image servers based on secret sharing. ACM Trans Multimedia Comput Commun Appl 19(1):1–19
5. Pande Dinesh et al (2023) Single secret sharing scheme using chinese remainder theorem, modified Shamir’s scheme, and XOR Operation. Wireless Personal Communications, pp. 1-29